usage policy free software


Search results for tag «usage policy»:

Internet Authentication and Usage Policy for Watchguard firewalls 1.1 Internet Authentication and Usage Policy for Watchguard firewalls 1.1
… The application encapsulates the Firebox applet and allows you to authenticate… 

eDeclaration 1.1 eDeclaration 1.1
… riod passes. The policy details are specified in a html document, and the file name can be specified in the section DeclarationDocument of the eDeclaration.ini.… 

Omniquad Surfwall - Enterprise Manager 2.882 Omniquad Surfwall - Enterprise Manager 2.882
… cies are managed centrally and can be based on user or computer groups, with or without… 

Desktop Manager & Policy Editor 1.0 Desktop Manager & Policy Editor 1.0
… re are some key features of "Desktop Manager Policy Editor": Full access to all WIndows 95/98 Policy settings. Includes un-documented settings which were not published by MS. Control panel and desktop protection. Advanced Boot and MSDOS settings.… 

Password Policy Enforcer 4.50 Password Policy Enforcer 4.50
… meters. ANIXIS Password Reset integration Password Policy Enforcer integrates with ANIXIS Password Reset, a self-service password management system that allows users to reset their password and unlock their account without calling the helpdesk.… 

PPE/Web 3.5 PPE/Web 3.5
… es contain some JavaScript to simplify navigation, but this can be removed if necessary. PPE/Web will work with any forms capable web browser. Password reset Administrators and helpdesk staff can use PPE/Web to reset forgotten user passwords.… 

SpaceCheck 1.3 SpaceCheck 1.3
… to them. SpaceCheck can be executed in a number of ways, depending on your site. It could be: Run from the login script Executed through Active Directory group policy Called from a scheduling tool Executed from application specific batch files… 

Usage Monitor 2.0.0.4 Usage Monitor 2.0.0.4
… nitor features Monitor Memory Usage, GDI Objects, USER Objects Minimize to the system tray for uncluttered monitoring Audible and visual alarm is triggered when a limit has been surpassed Display all processes or only processes you are monitoring… 

Du v 1.00 r 7 Du v 1.00 r 7
… tory and its subdirectories. Usage Usage: du [[-v] [-l ] | [-n]] [-q] -l Specify subdirectory depth of information (default is all levels) -n Don't recurse -q Don't print the banner -v Show information in intermediate directories… 

Disk Space Usage 2.4 Disk Space Usage 2.4
… ion for capacity planning and usage patterning. You can decide if you need to purchase additional space, or if someone needs to clean up their files. Requirements Netware Client 32… 


Related: